What the jot command can do for you

The jot command has been around for ages, but remains one of those interesting commands that…

IDG Contributor Network: Dealing with NIST’s about-face on password complexity

In the last few years, we've been seeing some significant changes in the suggestions that security…

IDG Contributor Network: Eight steps to the GDPR countdown

One year from today, the recently passed regulation known as “GDPR” (General Data Protection Regulation) goes…

IDG Contributor Network: The complexity of password complexity

Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users…

IDG Contributor Network: Who you gonna call?: Getting ready for the next cyber disaster

Are you ready for the next cyber disaster? You may not ever be fully ready. Given…

IDG Contributor Network: Who’s hogging the network? Bandwidth usage on a Linux system

There are a lot of reasons why systems slow down.Some process might be bogging down the…

IDG Contributor Network: Health tips for Unix systems

Periodic health checks can help ensure that your Unix systems are going to be available when…

IDG Contributor Network: Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

The overall equation is pretty simple: If you want to understand network traffic, you really should…